US7987269B1 - Administrative grouping of network resources - Google Patents
Administrative grouping of network resources Download PDFInfo
- Publication number
- US7987269B1 US7987269B1 US11/958,586 US95858607A US7987269B1 US 7987269 B1 US7987269 B1 US 7987269B1 US 95858607 A US95858607 A US 95858607A US 7987269 B1 US7987269 B1 US 7987269B1
- Authority
- US
- United States
- Prior art keywords
- asset
- domain
- administrative domain
- administrative
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
Definitions
- a user (such as the user performing the installation of the product) is assigned the task of registering the products.
- Each product is registered individually (i.e., each separate piece of hardware, each software package installed, etc.)
- the user is prompted to begin the registration task.
- the user typically fills information in data fields on a graphical user interface.
- the information supplied by the user may include information associated with the organization using the products, other hardware and/or software products that interface with the product being registered, etc.
- the information supplied by the user is then transmitted to the supplier of the product.
- embodiments disclosed herein overcome such drawbacks, as well as other drawbacks in the art.
- embodiments disclosed herein provide a grouping service that allows clients (e.g., companies, customers of the product manufacturer or its agents, etc.) the capability of forming arbitrary associations between the clients' identified representatives (such as system administrators).
- the grouping service also provides for creation of arbitrary associations among clients' assets (e.g., hardware and software resources accessible by a network) and certain permissions and privileges associated with those assets.
- a user identifies the product to the registration system and a group membership is assigned to the product.
- group membership the product is entitlement to support, services, etc. (e.g., software updates, patches, etc.) and ownership privileges associated with the group rather than with the individual user that registered the product.
- a product moves between administrative groups (e.g., a workstation is moved from the Accounting group to the Sales group, each having a respective administrative group).
- the grouping service performs a “scan” of group resources to identify all products that are not associated with the group. By identifying resources that are not associated (e.g., not registered) with a given administrative group, the grouping service provides an opportunity to re-register those resources with the appropriate group association. This re-registration can then trigger subsequent changes to support and services as required.
- embodiments herein disclose a domain manager (e.g., grouping service) that establishes an administrative domain for a network that has an associated set of assets and an associated set of users.
- the domain manager identifies at least one asset of the set of assets to be included in the administrative domain.
- An asset can be a hardware resource (e.g., computer, router, etc.) and/or a software resource (e.g., word processing application, Computer Aided Design “CAD” tool, etc.).
- the domain manager identifies at least one user of the set of users to be included in the administrative domain.
- the domain manager also establishes a set of roles within the administrative domain. For example, each role can define permissions (e.g., levels of accessibility) between a user and an asset (or group of assets) in the administrative domain.
- the domain manager determines whether that asset has an associated service tag.
- a service tag is provided by a registration client that manages registration of assets in the administrative domain.
- the service tag can identify context information associated with the asset such as a unique identifier, registration data, etc.
- the registration client can execute on behalf of the domain manger as part of the same process or as a separate process.
- the domain manager In response to determining that the asset does not have an associated service tag, the domain manager initiates re-registration of the asset with the administrative domain via the registration client.
- the registration client provides the asset with a unique service tag, if applicable, upon registration with the administrative domain. In this manner, the unique service tag is indicative of asset membership with the administrative domain.
- the domain manager establishes an asset subgroup hierarchically nested within the administrative domain.
- the asset subgroup can define a relationship among assets registered with the administrative domain.
- the domain manager defines the asset subgroup according to an asset type (e.g., Unix hosts, Solaris hosts, etc.).
- the administrative domain can then provides update services to assets according to asset type (e.g., software updates specific to the Unix or Solaris systems).
- inventions disclosed herein include any type of computerized device, workstation, handheld or laptop computer, or the like configured with software and/or circuitry (e.g., a processor) to process any or all of the method operations disclosed herein.
- a computerized device such as a computer or a data communications device or any type of processor that is programmed or configured to operate as explained herein is considered an embodiment disclosed herein.
- embodiments disclosed herein include software programs to perform the steps and operations summarized above and disclosed in detail below.
- One such embodiment comprises a computer program product that has a computer-readable medium including computer program logic encoded thereon that, when performed in a computerized device having a coupling of a memory and a processor, programs the processor to perform the operations disclosed herein.
- Such arrangements are typically provided as software, code and/or other data (e.g., data structures) arranged or encoded on a computer readable medium such as an optical medium (e.g., CD-ROM), floppy or hard disk or other a medium such as firmware or microcode in one or more ROM or RAM or PROM chips or as an Application Specific Integrated Circuit (ASIC).
- the software or firmware or other such configurations can be installed onto a computerized device to cause the computerized device to perform the techniques explained as embodiments disclosed herein.
- system disclosed herein may be embodied strictly as a software program, as software and hardware, or as hardware alone.
- the embodiments disclosed herein may be employed in computerized devices and software systems for devices such as those manufactured by Sun Microsystems, Inc. of Santa Clara, Calif.
- FIG. 1 is an example block diagram of a network environment illustrating creation and implementation of an administrative domain according to embodiments herein.
- FIG. 2 is an example block diagram of a relational model illustrating the relationship among various administrative entities according to embodiments herein.
- FIG. 3 is an example block diagram illustrating an implementation of an administrative environment according to embodiments herein.
- FIG. 4 is a block diagram illustrating an example computer system for executing a domain manager and related functions/processes according to embodiments herein.
- FIG. 5 is a flow chart of processing steps that shows processing operations performed by a domain manager in accordance with one example embodiment.
- FIGS. 6 and 7 combine to form a flow chart of processing steps that shows processing operations performed by a domain manager in accordance with one example embodiment.
- FIGS. 8 and 9 combine to form a flow chart of processing steps that shows processing operations performed by a domain manager in accordance with one example embodiment.
- FIG. 10 is a flow chart of processing steps that shows processing operations performed by a domain manager in accordance with one example embodiment.
- Embodiments disclosed herein provide a domain manager that allows clients (e.g., companies, customers of the product manufacturer or its agents, etc.) the capability of forming arbitrary associations between the clients' identified representatives (such as system administrators).
- the domain manager also provides for creation of arbitrary associations among clients' assets (e.g., hardware and software resources accessible by a network) and certain permissions and privileges associated with those assets.
- assets e.g., hardware and software resources accessible by a network
- such associations enable an automated and seamless approach for managing product registration/re-registration and system administration when assets and users of those assets transition between organizations.
- FIG. 1 is an example block diagram of a network environment 100 illustrating creation and implementation of an administrative domain according to embodiments herein.
- network environment 100 includes a network 101 (e.g., Local Area Network “LAN”, Wide Area Network “WAN”, the Internet, etc.), network assets 110 , network users 120 , registration client 130 and service tag(s) 135 , domain administrator 140 , domain manager 150 and administrative domain 160 .
- administrative domain 160 includes a set of assets 170 , a set of users 172 , a set of roles 174 and network services 180 (e.g., software upgrades, security patches, etc.).
- the network assets 110 can include any type of hardware and/or software resources that are accessible by network 101 .
- network assets 110 can include hardware resources such as personal computers, laptops, workstations, networking equipment (e.g., routers, gateways, etc.), data storage units, etc.
- network assets 110 can include software resources such as, for example, operating systems (e.g., Unix, Solaris, etc.), user-level applications (e.g., word processing tools, image processing tools, etc.), device drivers, etc.
- the domain manager 150 creates an administrative domain 160 that establishes arbitrary associations between certain network assets.
- the domain administrator 140 e.g., super-user
- the domain administrator can also determine which users are to be included in the administrative domain 160 by inviting those users to join the administrative domain 160 as a member.
- each user that is invited to join the administrative domain 160 can be assigned one role by the domain administrator 140 .
- each user's role can dictate the level of accessibility (e.g., read access, write access, read/write access, etc.) that a user has with respect to certain assets in the administrative domain 160 .
- each asset in the set of assets 170 must be registered with the domain manager 150 (or, alternatively, with the registration client 130 ) in order to receive any service and/or support provided by the administrative domain 160 .
- the registration client 130 registers a particular asset by providing that asset with a service tag 135 .
- a service tag 135 is similar to a cookie in that it resides on a device (e.g., network asset) and contains information specific to that device that can be updated, modified, retrieved, etc., by a remote process (e.g., registration client 130 ) from across a network 101 .
- the service tag 135 includes contextual data regarding a particular network asset such as, for example, a unique identifier value, registration information (e.g., start date, expiration date, groups/domains to which the asset is registered, etc.), local resource information (e.g., operating system, hardware configurations, etc.), and so on.
- registration information e.g., start date, expiration date, groups/domains to which the asset is registered, etc.
- local resource information e.g., operating system, hardware configurations, etc.
- the administrative domain 160 provides support and services (e.g., network services 180 such as software upgrades, security patches, etc.) to assets that are a member of the administrative domain 160 and that are also currently registered with the administrative domain 160 .
- network services 180 such as software upgrades, security patches, etc.
- the administrative domain 160 , domain manager 150 and/or registration client 130 do not necessarily provide network services 180 directly to the network assets 110 . Instead, as in one embodiment, the administrative domain 160 initiates administration of network services 180 by delegating those tasks to another process in network 101 .
- FIG. 2 is an example block diagram of an administrative relational model 200 illustrating the relationship among various administrative entities according to embodiments herein.
- administrative relational model 200 includes an administrative domain class 210 , an asset class 220 , an asset type class 230 , an asset group class 240 , a service class 250 , a user class 260 , a role class 270 and a permission class 280 .
- an administrative domain is an instantiation of the administrative domain class 210 that defines an administrative context containing users and assets along with the roles that administratively relate the users with the assets.
- a user is an instantiation of the user class 260 representing an individual or organization that accesses the network assets (e.g., company property such as hardware and/or software resources in the same identity domain).
- the network assets e.g., company property such as hardware and/or software resources in the same identity domain.
- An asset is an instantiation of the asset class 220 representing an item owned by and providing value for an individual or organization.
- An asset group is an instantiation of the asset group class 240 representing a collection of assets implying an arbitrary relationship between the constituent assets.
- a role is an instantiation of the role class 270 representing a job function within the context of an administrative domain that has associated semantics regarding the authority and responsibility conferred on the user assigned to the role.
- a permission is an instantiation of the permission class 280 that defines the ability or right to perform an operation on a resource (e.g., an administrative domain, asset group, etc.) in accordance with specified conditions.
- a resource e.g., an administrative domain, asset group, etc.
- a service is an instantiation of the service class 250 representing a resource (e.g., an informational web page, a portal, etc.) that is relevant to one or more types of assets.
- a resource e.g., an informational web page, a portal, etc.
- the administrative domain class 210 can include one or more users as shown by relational connector 263 .
- the administrative domain class 210 requires one user that is assigned a “super-user” role for that particular domain.
- the administrative domain class 210 contains one or more roles with permissions as shown by relational connector 275 . Such roles and associated permissions entitle users to operate against entities within the administrative scope of the domain. According to one embodiment, the administrative domain has at least one “Super-user” role that confers all privileges against all entities within that particular domain. For example, the domain administrator 140 in FIG. 1 is the super-user of administrative domain 160 .
- the administrative domain class 210 can have zero or more assets registered therewith as shown by relational connector 215 .
- the administrative domain class 210 can contain one or more asset groups (as shown by relational connector 245 ) that are capable of containing assets registered with the domain.
- the administrative domain class 210 contains a “Global” group that contains all assets registered with that particular domain.
- the administrative domain class 210 can contain zero or more administrative sub-domains nested hierarchically within the top-level administrative domain (each of which, as an administrative domain in its own right, can recursively contain other sub-domains). Such recursive nesting is represented by relational connector 295 . Per this embodiment, each sub-domain has a single parent.
- the user class 260 can be affiliated with multiple administrative. Roles assigned to the user can differ across these Administrative Domains. For example, a user can be assigned a “super-user”role for administrative domain X while that same user is assigned a lesser role (e.g., read access only) for administrative domain Y.
- a user can be assigned one or more roles for a given administrative domain. Note that a user must have at least one role assigned in order to perform operations within the scope of the administrative domain.
- a user is not associated directly with an asset, an asset group, or a permission.
- revocation of a user's right to manage assets controlled by an administrative domain can be achieved by merely dissociating the roles from the user and, thus, terminating any undesired permissions.
- assets can be registered with exactly one administrative domain. Nonetheless, each asset registered with an administrative domain can be contained by one or more asset groups within that particular domain as shown by relational connector 235 . In one embodiment, each asset is at least contained in the “Global” asset group for that administrative domain.
- an asset can be classified as belonging to one or more asset types.
- a Solaris 10 asset can be classified using the following types: “Software”, “Operating System”, “Solaris”, and “Solaris 10”.
- asset types are arranged hierarchically (e.g., “Software” ⁇ “Operating System” ⁇ “Solaris” ⁇ “Solaris 10”, where “ ⁇ ” implies that the type on the left is a super-type of the type on the right).
- the relationship of sub-types vis-à-vis super-types is shown by relational connector 297 .
- the asset group class 240 is contained within exactly one administrative domain.
- a default asset group “Global” is provided for every administrative domain and contains all of the assets registered with that particular domain.
- an asset group can contain zero or more assets. Note that an asset should not be included more than once in any given asset group (e.g., an asset group exhibits set semantics). According to one embodiment, the asset group class 240 can only contain assets registered with the administrative domain in which the asset group is contained.
- an asset group can contain zero or more hierarchically nested asset groups, or asset subgroups. It is also possible for an asset group to be contained within one or more asset groups.
- the service class 250 can be associated with zero or more asset types; thus, expressing relevance to the asset instances of that asset type.
- an asset type can have zero or more associated services as shown by relational connector 255 .
- the role class 270 can be assigned to zero or more users in an administrative domain as shown by relational connector 265 .
- the “super-user” role must be assigned to at least one user in the administrative domain.
- the role class 270 is composed of zero or more permissions.
- a permission instance belongs to exactly one role.
- a permission instance can convey permission to perform one or more types of operations against one or more resource types or instances.
- roles support privileges/permissions (object-operation associations) such as:
- FIG. 3 is an example block diagram illustrating an implementation of an administrative environment 300 according to embodiments herein.
- administrative environment 300 includes administrative domain 310 (e.g., “Acme Corp”), administrative domain 340 (e.g., “Broomfield”) and administrative domain 370 (e.g., “Santa Clara”).
- Administrative domain 310 includes user Tom 312 , user Dick 314 and user Harry 316 .
- User Tom 312 is assigned role 322 (e.g., “Domain Manager”)
- user Dick 314 is assigned role 324 (e.g., “Group Admin” of asset group 335 )
- user Harry 316 is assigned role 326 (e.g., “Domain Admin”).
- administrative domain 310 includes asset group 330 (e.g., “Dev Systems) containing assets A 1 , A 2 and A 3 , as well as asset group 335 (e.g., (“Test Systems”) containing assets A 4 and A 5 .
- asset group 330 e.g., “Dev Systems”
- asset group 335 e.g., (“Test Systems”
- asset A 4 is contained in both asset group 330 and asset group 335 .
- Administrative domain 340 (e.g., “Broomfield”) is a sub-domain of administrative domain 310 (e.g., “Acme Corp”). As shown in FIG. 3 , administrative domain 340 includes user Jack 342 and user Bob 344 having been both been assigned role 352 (e.g., “Domain Manager”). Also contained in administrative domain 340 are assets A 7 , A 8 and A 9 . Note that administrative domain 340 does not have any asset groups.
- Administrative domain 370 (e.g., “Santa Clara”) is also a sub-domain of administrative domain 310 (e.g., “Acme Corp”).
- administrative domain 370 includes user Jill 372 and user Bob 344 having been assigned role 382 (e.g., “Domain Manager”) and role 384 (e.g., “Group Admin” of asset subgroup 394 ), respectively.
- role 382 e.g., “Domain Manager”
- role 384 e.g., “Group Admin” of asset subgroup 394
- user Bob 344 is a member of both administrative domain 340 and 370 .
- user Bob 344 has been assigned different roles (e.g., role 352 and role 384 ) in each respective sub-domain.
- administrative domain 370 includes asset group 390 (e.g., “Unix Hosts”) that contains nested asset subgroup 392 (e.g., “Solaris Hosts”) and nested asset subgroup 394 (e.g., “Red Hat Hosts”).
- asset subgroup 392 contains assets A 9 , A 10 and A 11
- asset subgroup 394 contains assets A 12 and A 13 .
- the “Domain Manager” role is representative of the “super-user” role for that particular domain.
- roles 322 , 352 and 382 each have the same definition (e.g., “Domain Manager” or “super-user”), these roles do not necessarily confer the same privileges/permissions to their respective user assignees.
- role 352 confers domain manager privileges/permissions to user Jack 342 and user Bob 344 only for administrative domain 340 .
- role 382 confers domain manager privileges/permissions to user Jill 372 only for administrative domain 370 .
- role 322 confers domain manager privileges/permissions to user Tom 312 for administrative domain 310 as well as any sub-domains (e.g., administrative domain 340 and administrative domain 370 ). In an alternate embodiment, role 322 does not confer privileges/permissions to any sub-domains, thus user Tom 312 would only have domain manager status with respect to administrative domain 310 .
- administrative domains shown in FIG. 3 can be organized according to different logical configurations.
- administrative domains 340 and 370 are organized according to proximity (e.g., the Broomfield location and the Santa Clara location).
- administrative domains (or sub-domains) can be organized according to logical business units such as Accounting, Sales, Marketing, Engineering, etc.
- FIG. 4 is a block diagram illustrating an example computer system 410 for executing a domain manager 150 and related functions/processes according to embodiments herein.
- Computer system 410 may be a computerized device such as a personal computer, workstation, portable computing device, console, network terminal, processing device, etc.
- computer system 410 of the present example includes an interconnect 411 that couples a memory system 412 , a processor 413 , an I/O interface 414 , and a communications interface 415 .
- I/O interface 414 enables computer system 410 to display a graphical user interface on display screen 430 .
- An input device 416 e.g., one or more user/developer controlled devices such as a pointing device, keyboard, mouse, etc.
- processor 413 couples to processor 413 through I/O interface 414 , and enables a user (e.g., domain administrator 140 ) to provide input commands and generally control the graphical user interface that a domain manager application 150 - 1 and a domain manager process 150 - 2 provides for display on display 430 .
- Communications interface 415 of computer system 410 enables computer system 410 to communicate over network 101 to transmit and receive information from different resources.
- domain manager application 150 - 1 supporting domain administration and automated product registration processing and other functions according to embodiments herein.
- Domain manager application 150 - 1 can be embodied as software code such as data and/or logic instructions (e.g., code stored in the memory or on another computer readable medium such as a disk) that support functionality according to different embodiments described herein.
- processor 413 accesses memory system 412 via the interconnect 411 in order to launch, run, execute, interpret or otherwise perform the logic instructions of the domain manager application 150 - 1 .
- Execution of the domain manager application 150 - 1 produces processing functionality in domain manager process 150 - 2 .
- the domain manager process 150 - 2 represents one or more portions of the domain manager application 150 - 1 (or the entire application) performing within or upon the processor 413 in the computer system 410 .
- domain manager process 150 - 2 executed in computer system 410 can be represented by either one or both of the domain manager application 150 - 1 and/or the domain manager process 150 - 2 .
- general reference will again be made to the domain manager process 150 - 2 as performing or supporting the various steps and functional operations as previously discussed and as will be discussed further in this specification.
- embodiments herein include the domain manager application 150 - 1 itself (i.e., the un-executed or non-performing logic instructions and/or data).
- the domain manager application 150 - 1 may be stored on a computer readable medium such as a floppy disk, hard disk, or optical medium.
- the domain manager application 150 - 1 may also be stored in a memory type system such as in firmware, read only memory (ROM), or, as in this example, as executable code within the memory system 412 (e.g., within Random Access Memory or RAM).
- ROM read only memory
- other embodiments herein include the execution of domain manager application 150 - 1 in processor 413 as the domain manager process 150 - 2 .
- the computer system 410 may include other processes and/or software and hardware components, such as an operating system that controls allocation and use of hardware resources.
- FIGS. 5-10 include flowcharts according to embodiments herein. Each step denotes one or more computer software instructions or groups of instructions or hardware logic that carry out such functionality.
- the flow diagrams do not necessarily depict the syntax of any particular programming language. Rather, the flow diagrams illustrate the functional information one of ordinary skill in the art could use to fabricate hardware circuits and/or to generate computer software (or a hybrid of both hardware circuits and software code) to carry out the features as described herein.
- FIG. 5 is a flow chart 500 of processing steps that shows processing operations performed by the domain manager 150 in accordance with one example embodiment.
- the domain manager 150 establishes an administrative domain for a network that has an associated set of assets and an associated set of users.
- each asset represents at least one of a software resource and a hardware resource detectable by the network.
- the domain manager 150 identifies at least one asset of the set of assets to be included in the administrative domain, wherein each asset has at least one asset type.
- asset A 4 has an asset type “Dev Systems” and an asset type “Test Systems” since asset A 4 is contained within respective asset groups 330 and 335 .
- the domain manager 150 identifies at least one user of the set of users to be included in the administrative domain.
- users can be included in the administrative domain by receiving and subsequently accepting a request or invitation to join the administrative domain.
- a request or invitation is provided by the administrative domain “super-user” or domain manager (e.g., domain administrator 140 in FIG. 1 ).
- the domain manager 150 establishes a set of roles within the administrative domain.
- Each role can define permissions (e.g., levels of accessibility and authority) between a user and an asset in the administrative domain.
- FIGS. 6 and 7 combine to form a flow chart 600 (e.g., flowchart 600 - 1 and flowchart 600 - 2 ) of processing steps that shows processing operations performed by the domain manager 150 in accordance with one example embodiment.
- a flow chart 600 e.g., flowchart 600 - 1 and flowchart 600 - 2 .
- the domain manager 150 identifies at least one asset of the set of assets to be included in the administrative domain such that each asset has at least one asset type.
- step 610 the domain manager 150 registers the asset with the administrative domain. According to one embodiment, registration avails the asset of services provided by the administrative domain.
- step 615 the domain manager 150 detects a registration status of each asset included in the administrative domain. In this manner, the registration status is indicative of whether a given asset is registered with the administrative domain.
- step 620 in response to detecting that the registration status of the given asset indicates that the given asset is not registered with the administrative domain, the domain manager 150 initiates re-registration of the given assets to provide an opportunity for the given asset to be registered with the administrative domain.
- the domain manager 150 detects that a given asset has been transferred to the administrative domain from a second administrative domain. In another embodiment, the domain manager 150 detects that the given asset has changed ownership from a different organization (e.g., company, university, etc.) and is now owned by the organization associated with the administrative domain.
- a different organization e.g., company, university, etc.
- the domain manager 150 detects that the given asset that has been transferred from the administrative domain to a third administrative domain.
- the third administrative domain is a different domain than the second administrative domain.
- the third administrative domain is the same domain as the second administrative domain.
- the domain manager 150 can also detect that the given asset has changed ownership to a different organization (e.g., company, university, etc.) and is now no longer owned by the organization associated with the administrative domain.
- a different organization e.g., company, university, etc.
- the domain manager 150 in response to detecting that the registration status of the given asset indicates that the given asset is not registered with the administrative domain, the domain manager 150 disassociates the given asset from the administrative domain such that the given asset can no longer receive services provided by the administrative domain. For example, in one embodiment the domain manager 150 disassociates an asset by terminating or revoking the registration associated with that particular asset.
- the domain manager 150 determines whether each asset has an associated service tag (e.g., via a scan of the assets in the domain).
- the service tag can be provided by a registration client that manages registration of assets in the administrative domain. More specifically, the service tag identifies context information associated with the asset including information such as a unique identifier for the asset, registration data, if any, associated with the administrative domain (e.g., start date, expiration date, group/domain membership, etc.), local resource information (e.g., operating system, hardware configuration, etc.).
- the domain manager 150 can initiate re-registration of the asset with the administrative domain via the registration client.
- the registration client provides the asset with a unique service tag, if applicable, upon registration with the administrative domain. Accordingly, the unique service tag is indicative of asset membership with the administrative domain.
- FIGS. 8 and 9 combine to form a flow chart 800 (e.g., flowchart 800 - 1 and flowchart 800 - 2 ) of processing steps that shows processing operations performed by the domain manager 150 in accordance with one example embodiment.
- a flow chart 800 e.g., flowchart 800 - 1 and flowchart 800 - 2 .
- step 805 the domain manager 150 establishes an administrative domain for a network that has an associated set of assets and an associated set of users.
- the domain manager 150 establishes an administrative sub-domain hierarchically nested within the administrative domain (e.g., administrative domain 340 and 370 as shown in the example embodiment of FIG. 3 ).
- the administrative sub-domain can identify a subset of assets and a subset of users registered with the administrative domain.
- the administrative sub-domain identifies sub-domain roles that define permissions between the subset of users and the subset of assets.
- the domain manager 150 defines the administrative sub-domain according to a logical business grouping.
- an administrative sub-domain can be organized according to such logical business groupings as accounting, marketing, engineering, sales, corporate, legal, etc.
- the domain manager 150 defines the administrative sub-domain according to a proximity of assets configured within the network.
- administrative sub-domains can be organized according to location (e.g., Broomfield, Santa Clara, 10 th floor, Research and Development Lab, etc.).
- the domain manager 150 establishes an asset subgroup hierarchically nested within the administrative domain.
- the asset subgroup defines a relationship among assets registered with the administrative domain. More specifically, as in one example embodiment, an asset subgroup is defined according to an asset type (e.g., “Unix”, “Solaris”, “Operating Systems”, “Workstations”, etc.). With this configuration, the administrative domain can provide update services to assets according to asset type.
- asset type e.g., “Unix”, “Solaris”, “Operating Systems”, “Workstations”, etc.
- step 835 the domain manager 150 establishes a set of roles within the administrative domain such that each role defines permissions between a user and an asset in the administrative domain.
- the domain manager 150 establishes a role that, at least in part, permits a user assigned the role to create an asset subgroup in the administrative domain.
- a role permits the user to select specific assets to be included in the asset subgroup and to define subgroup roles specific to the asset subgroup.
- the “Group Admin” role 324 assigned to user Dick 314 may include privileges/permissions enabling user Dick 314 to create an asset group (e.g., asset group 335 “Test Systems”) that contains assets A 4 and A 5 .
- the domain manager 150 enables permissions associated with a respective role to be revocable by an administrator of the administrative domain.
- the permissions define a level of accessibility and/or authority (e.g., read, write, update, monitor, asset subgroup creation, etc.) between a given user and a given asset, a given asset type, and/or a given asset subgroup.
- FIG. 10 is a flow chart 1000 of processing steps that shows processing operations performed by the domain manager 150 in accordance with one example embodiment.
- step 1005 the domain manager 150 identifies at least one user of the set of users to be included in the administrative domain.
- step 1010 domain manager 150 detects that a user, having previously been assigned a role within the administrative domain, is no longer associated with the administrative domain
- step 1015 in response to detecting that the user is no longer associated with the administrative domain, the domain manager 150 disassociates the role from the user in order to revoke any permissions in which the role assigned to the user had provided. By disassociating the role from the user, the domain manager 150 assures that the user can no longer interact with assets in the administrative domain.
- the domain manager 150 will detect (e.g., via a scan of administrative domain 370 ) that user Jill 372 is no longer a member of administrative domain 370 . As a result, the domain manager 150 disassociates (e.g., revokes, terminates, etc.) the role 382 assigned to user Jill 372 such that user Jill 372 can no longer interact with assets in administrative domain 370 .
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Educational Administration (AREA)
- Game Theory and Decision Science (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims (5)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/958,586 US7987269B1 (en) | 2007-12-18 | 2007-12-18 | Administrative grouping of network resources |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/958,586 US7987269B1 (en) | 2007-12-18 | 2007-12-18 | Administrative grouping of network resources |
Publications (1)
Publication Number | Publication Date |
---|---|
US7987269B1 true US7987269B1 (en) | 2011-07-26 |
Family
ID=44281081
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/958,586 Active 2029-07-03 US7987269B1 (en) | 2007-12-18 | 2007-12-18 | Administrative grouping of network resources |
Country Status (1)
Country | Link |
---|---|
US (1) | US7987269B1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110145903A1 (en) * | 2009-12-10 | 2011-06-16 | Equinix, Inc. | Unified user login for co-location facilities |
US20130198369A1 (en) * | 2012-01-30 | 2013-08-01 | Electronics And Telecommunications Research Institute | Method and apparatus for mapping locator and identifier of mobile host |
US20130326588A1 (en) * | 2012-05-29 | 2013-12-05 | International Business Machines Corporation | Enabling Host Based RBAC Roles for LDAP Users |
US20140237039A1 (en) * | 2013-02-18 | 2014-08-21 | International Business Machines Corporation | Intelligently detecting the leader of a co-browsing session |
US20180176100A1 (en) * | 2016-12-16 | 2018-06-21 | Orange | Method for using an extended workstation, and an associated system for using an extended workstation |
US10430606B1 (en) * | 2018-04-30 | 2019-10-01 | Aras Corporation | System and method for implementing domain based access control on queries of a self-describing data system |
US20220114265A1 (en) * | 2020-10-08 | 2022-04-14 | Google Llc | Unified viewing of roles and permissions in a computer data processing system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030033387A1 (en) | 2001-07-27 | 2003-02-13 | Adams Mark A. | Powertag: manufacturing and support system method and apparatus for multi-computer solutions |
US20030195904A1 (en) | 2002-04-10 | 2003-10-16 | William Chestnut | Object monitoring and management system |
US20040143492A1 (en) | 2003-01-17 | 2004-07-22 | Howell James A. | Process for restoring upgrade keys or promotional offers using a unique identifier |
US20050044197A1 (en) | 2003-08-18 | 2005-02-24 | Sun Microsystems.Inc. | Structured methodology and design patterns for web services |
US20090235330A1 (en) * | 2005-04-08 | 2009-09-17 | Young Bae Byun | Domain management method and domain context of users and devices based domain system |
-
2007
- 2007-12-18 US US11/958,586 patent/US7987269B1/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030033387A1 (en) | 2001-07-27 | 2003-02-13 | Adams Mark A. | Powertag: manufacturing and support system method and apparatus for multi-computer solutions |
US20030195904A1 (en) | 2002-04-10 | 2003-10-16 | William Chestnut | Object monitoring and management system |
US20040143492A1 (en) | 2003-01-17 | 2004-07-22 | Howell James A. | Process for restoring upgrade keys or promotional offers using a unique identifier |
US20050044197A1 (en) | 2003-08-18 | 2005-02-24 | Sun Microsystems.Inc. | Structured methodology and design patterns for web services |
US20090235330A1 (en) * | 2005-04-08 | 2009-09-17 | Young Bae Byun | Domain management method and domain context of users and devices based domain system |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9595013B2 (en) | 2009-12-10 | 2017-03-14 | Equinix, Inc. | Delegated and restricted asset-based permissions management for co-location facilities |
US20110145292A1 (en) * | 2009-12-10 | 2011-06-16 | Equinix, Inc. | Delegated and restricted asset-based permissions management for co-location facilities |
US20110145903A1 (en) * | 2009-12-10 | 2011-06-16 | Equinix, Inc. | Unified user login for co-location facilities |
US9082091B2 (en) * | 2009-12-10 | 2015-07-14 | Equinix, Inc. | Unified user login for co-location facilities |
US20130198369A1 (en) * | 2012-01-30 | 2013-08-01 | Electronics And Telecommunications Research Institute | Method and apparatus for mapping locator and identifier of mobile host |
US20130326588A1 (en) * | 2012-05-29 | 2013-12-05 | International Business Machines Corporation | Enabling Host Based RBAC Roles for LDAP Users |
US9081950B2 (en) * | 2012-05-29 | 2015-07-14 | International Business Machines Corporation | Enabling host based RBAC roles for LDAP users |
US20140237039A1 (en) * | 2013-02-18 | 2014-08-21 | International Business Machines Corporation | Intelligently detecting the leader of a co-browsing session |
US9313282B2 (en) * | 2013-02-18 | 2016-04-12 | International Business Machines Corporation | Intelligently detecting the leader of a co-browsing session |
US9686366B2 (en) | 2013-02-18 | 2017-06-20 | International Business Machines Corporation | Intelligently detecting the leader of a co-browsing session |
US20180176100A1 (en) * | 2016-12-16 | 2018-06-21 | Orange | Method for using an extended workstation, and an associated system for using an extended workstation |
US11463329B2 (en) * | 2016-12-16 | 2022-10-04 | Orange | Method for using an extended workstation, and an associated system for using an extended workstation |
US10891392B2 (en) | 2018-04-27 | 2021-01-12 | Aras Corporation | System and method for implementing domain based access control on queries of a self-describing data system |
US10430606B1 (en) * | 2018-04-30 | 2019-10-01 | Aras Corporation | System and method for implementing domain based access control on queries of a self-describing data system |
US10572678B2 (en) | 2018-04-30 | 2020-02-25 | Aras Corporation | System and method for implementing domain based access control on queries of a self-describing data system |
US20220114265A1 (en) * | 2020-10-08 | 2022-04-14 | Google Llc | Unified viewing of roles and permissions in a computer data processing system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7987269B1 (en) | Administrative grouping of network resources | |
EP2510473B1 (en) | Unified user login for co-location facilities | |
RU2344466C2 (en) | Architecture of workflow services | |
US10560458B2 (en) | Resource sharing in cloud computing | |
US7703667B2 (en) | Management and application of entitlements | |
JP5238017B2 (en) | Method and apparatus for managing printing devices in a local area network | |
Edwards et al. | The infrastructure problem in HCI | |
US8495182B1 (en) | Scalable systems management abstraction framework | |
US8719949B1 (en) | Parameter based operation | |
JP2016517076A (en) | Automated desktop placement | |
CN102299915A (en) | Access control based on network layer claims | |
CN108431768A (en) | Using the controlled deployment of feature | |
US20100011408A1 (en) | Implementing Organization-Specific Policy During Establishment of an Autonomous Connection Between Computer Resources | |
US20180295118A1 (en) | Credential-based proactive discovery of remote micro-services by spreadsheet applications | |
US20140067868A1 (en) | Schema Mapping Based on Data Views and Database Tables | |
US20100023577A1 (en) | Method, system and article for mobile metadata software agent in a data-centric computing environment | |
US8745387B2 (en) | Security management for an integrated console for applications associated with multiple user registries | |
US7707585B2 (en) | Method, system, and program product for monitoring message flow in a message queuing system | |
CN114041275A (en) | Confidential lifecycle management on a serverless platform | |
US8364837B2 (en) | Virtual web service | |
US7664756B1 (en) | Configuration management database implementation with end-to-end cross-checking system and method | |
CN114745757A (en) | Cluster switching method, device, equipment and medium | |
CN115712371A (en) | Customer service robot operation method, server, operation system, electronic device and storage medium | |
US8402136B1 (en) | Methods and apparatus for discovery driven product registration | |
US20170185949A1 (en) | Methods and apparatus for managing assets using service tags |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: ORACLE USA, INC., CALIFORNIA Free format text: MERGER;ASSIGNOR:SUN MIRCROSYSTEMS, INC.;REEL/FRAME:026692/0225 Effective date: 20100212 |
|
AS | Assignment |
Owner name: ORACLE AMERICA, INC., CALIFORNIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE RECEIVING PARTY DATA (ASSIGNEE) PREVIOUSLY RECORDED ON REEL 026692 FRAME 0225. ASSIGNOR(S) HEREBY CONFIRMS THE MERGER;ASSIGNOR:SUN MIRCROSYSTEMS, INC.;REEL/FRAME:026932/0184 Effective date: 20100212 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |